4.3 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.1 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
13.1%
In the Linux kernel, the following vulnerability has been resolved: wifi:
brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach This is the
candidate patch of CVE-2023-47233 :
https://nvd.nist.gov/vuln/detail/CVE-2023-47233 In brcm80211 driver,it
starts with the following invoking chain to start init a timeout worker:
->brcmf_usb_probe ->brcmf_usb_probe_cb ->brcmf_attach ->brcmf_bus_started
->brcmf_cfg80211_attach ->wl_init_priv ->brcmf_init_escan
->INIT_WORK(&cfg->escan_timeout_work, brcmf_cfg80211_escan_timeout_worker);
If we disconnect the USB by hotplug, it will call brcmf_usb_disconnect to
make cleanup. The invoking chain is : brcmf_usb_disconnect
->brcmf_usb_disconnect_cb ->brcmf_detach ->brcmf_cfg80211_detach
->kfree(cfg); While the timeout woker may still be running. This will cause
a use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker. Fix it
by deleting the timer and canceling the worker in brcmf_cfg80211_detach.
[[email protected]: keep timer delete as is and cancel work just
before free]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-186.206 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1126.136 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
git.kernel.org/linus/0f7352557a35ab7888bc7831411ec8a3cbe20d78 (6.9-rc1)
git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
launchpad.net/bugs/cve/CVE-2024-35811
nvd.nist.gov/vuln/detail/CVE-2024-35811
security-tracker.debian.org/tracker/CVE-2024-35811
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
ubuntu.com/security/notices/USN-6831-1
www.cve.org/CVERecord?id=CVE-2024-35811
4.3 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.1 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
13.1%